A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2024-3385 |
![]() ![]() ![]() |
History
Fri, 24 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paloaltonetworks
Paloaltonetworks pa-5410 Paloaltonetworks pa-5420 Paloaltonetworks pa-5430 Paloaltonetworks pa-5440 Paloaltonetworks pa-5445 Paloaltonetworks pa-7050 Paloaltonetworks pa-7080 Paloaltonetworks pan-os |
|
CPEs | cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:* |
|
Vendors & Products |
Paloaltonetworks
Paloaltonetworks pa-5410 Paloaltonetworks pa-5420 Paloaltonetworks pa-5430 Paloaltonetworks pa-5440 Paloaltonetworks pa-5445 Paloaltonetworks pa-7050 Paloaltonetworks pa-7080 Paloaltonetworks pan-os |

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-08-22T18:10:55.925Z
Reserved: 2024-04-05T17:40:18.347Z
Link: CVE-2024-3385

Updated: 2024-08-01T20:12:06.539Z

Status : Analyzed
Published: 2024-04-10T17:15:57.410
Modified: 2025-01-24T15:55:48.127
Link: CVE-2024-3385

No data.